βΌ CVE-2022-4089 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in rickxy Stock Management System. It has been declared as problematic. This vulnerability affects unknown code of the file /pages/processlogin.php. The manipulation of the argument user leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214324.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44748 βΌ
π Read
via "National Vulnerability Database".
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Server since 4.3.0 can result in arbitrary files being overwritten on the server's file system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being uploaded, can overwrite arbitrary files that the operating system user running the KNIME Server process has write access to. The user must be authenticated and have permissions to upload files to KNIME Server. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the KNIME Server process user. In all cases the attacker has to know the location of files on the server's file system, though. Note that users that have permissions to upload workflows usually also have permissions to run them on the KNIME Server and can therefore already execute arbitrary code in the context of the KNIME Executor's operating system user. There is no workaround to prevent this vulnerability from being exploited. Updates to fixed versions 4.13.6, 4.14.3, or 4.15.3 are advised.π Read
via "National Vulnerability Database".
βΌ CVE-2022-44749 βΌ
π Read
via "National Vulnerability Database".
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4088 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in rickxy Stock Management System and classified as critical. Affected by this issue is some unknown functionality of the file /pages/processlogin.php. The manipulation of the argument user/password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214322 is the identifier assigned to this vulnerability.π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-40976 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip').π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-40977 βΌ
π Read
via "National Vulnerability Database".
A path traversal vulnerability was discovered in Pilz PASvisu Server before 1.12.0. An unauthenticated remote attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip').π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-4136 βΌ
π Read
via "National Vulnerability Database".
Attackers can call any existing functions at will, control the target server to access, download, create files, delete files, etc. Access may make the server a dos server. Download, so that an attacker can download the PHP Trojan to the server. Creating and deleting will destroy normal services. More than ten IPs are using this service.π Read
via "National Vulnerability Database".
βΌ CVE-2022-40266 βΌ
π Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in Mitsubishi Electric GOT2000 Series GT27 model FTP server versions 01.39.000 and prior, Mitsubishi Electric GOT2000 Series GT25 model FTP server versions 01.39.000 and prior and Mitsubishi Electric GOT2000 Series GT23 model FTP server versions 01.39.000 and prior allows a remote authenticated attacker to cause a Denial of Service condition by sending specially crafted command.π Read
via "National Vulnerability Database".
π Falco 0.33.1 π
π Read
via "Packet Storm Security".
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.π Read
via "Packet Storm Security".
Packetstormsecurity
Falco 0.33.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2022-4090 βΌ
π Read
via "National Vulnerability Database".
A vulnerability was found in rickxy Stock Management System and classified as problematic. This issue affects some unknown processing of the file us_transac.php?action=add. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214331.π Read
via "National Vulnerability Database".
β Multimillion dollar CryptoRom scam sites seized, suspects arrested in US β
π Read
via "Naked Security".
Five tips to keep yourself, and your friends and family, out of the clutches of "chopping block" scammers...π Read
via "Naked Security".
Naked Security
Multimillion dollar CryptoRom scam sites seized, suspects arrested in US
Five tips to keep yourself, and your friends and family, out of the clutches of βchopping blockβ scammersβ¦
π1
β S3 Ep110: Spotlight on cyberthreats β an expert speaks [Audio + Text] β
π Read
via "Naked Security".
Latest episode - security expert John Shier explains what the real-life cybercrime stories in the Sophos Threat Report can teach usπ Read
via "Naked Security".
Naked Security
S3 Ep110: Spotlight on cyberthreats β an expert speaks [Audio + Text]
Latest episode β security expert John Shier explains what the real-life cybercrime stories in the Sophos Threat Report can teach us
βΌ CVE-2022-26885 βΌ
π Read
via "National Vulnerability Database".
When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2650 βΌ
π Read
via "National Vulnerability Database".
Improper Restriction of Excessive Authentication Attempts in GitHub repository wger-project/wger prior to 2.2.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45885 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45888 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45884 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.π Read
via "National Vulnerability Database".
βΌ CVE-2022-45886 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.π Read
via "National Vulnerability Database".
βΌ CVE-2022-2721 βΌ
π Read
via "National Vulnerability Database".
In affected versions of Octopus Server it is possible for target discovery to print certain values marked as sensitive to log files in plaint-text in when verbose logging is enabled.π Read
via "National Vulnerability Database".
βΌ CVE-2022-4135 βΌ
π Read
via "National Vulnerability Database".
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)π Read
via "National Vulnerability Database".
π1
βΌ CVE-2022-40282 βΌ
π Read
via "National Vulnerability Database".
The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.π Read
via "National Vulnerability Database".